IBM Proventia Network Enterprise User Manual - page 192
Chapter 14: Running Ad Hoc Scans
192
IBM Internet Security Systems
Understanding How Ad Hoc Scans Use Policies
Introduction
All scans, whether ad hoc or background, follow the options specified in the applicable
policies. Some policies are shared between ad hoc and background scans while others are
defined separately.
Shared policies
Ad hoc scans share these policies with background scans in the same scanning group:
●
Assessment Credentials
●
Network Services
●
Scan Exclusion
Note:
This policy applies only to assessment scans for either ad hoc or background
scans.
●
Scan Window (optional)
Separately
configurable policies
You can change the following policies for ad hoc scans when you configure the scan:
●
Assessment
●
Discovery
●
Scan Control
Changes you make to these policies do not affect the settings for the policies in
background scans. For an example of the ad hoc scan user interface, see Figure 4 on
page 47.
Policy initialization
As a convenience, ad hoc scans start with the settings defined for Discovery and
Assessment policies, if those background policies are defined.
Policy inheritance
Policy inheritance for ad hoc scans works as follows:
●
Discovery scans run against only the group for which they are defined.
●
Assessment scans run against the group for which they are defined and every
subgroup that inherits the assessment policy.